Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Integration Guide
Copyright© 1999-2009 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this
document may be reproduced by any means nor modified, decompiled, disassembled,
published or distributed, in whole or in part, or translated to any electronic medium or other
means without the written consent of Blue Coat Systems, Inc. All right, title and interest in and
to the Software and documentation are and shall remain the exclusive property of Blue Coat
Systems, Inc. and its licensors. ProxyAV™, CacheOS™, SGOS™, SG™, Spyware Interceptor™,
Scope™, ProxyRA Connector™, ProxyRA Manager™, Remote Access™ and MACH5™ are
trademarks of Blue Coat Systems, Inc. and CacheFlow®, Blue Coat®, Accelerating The
Internet®, ProxySG®, WinProxy®, PacketShaper®, PacketShaper Xpress®, PolicyCenter®,
PacketWise®, AccessNow®, Ositis®, Powering Internet Management®, The Ultimate Internet
Sharing Solution®, Cerberian®, Permeo®, Permeo Technologies, Inc.®, and the Cerberian and
Permeo logos are registered trademarks of Blue Coat Systems, Inc. All other trademarks
contained in this document and in the Software are the property of their respective owners.
BLUE COAT SYSTEMS, INC. AND BLUE COAT SYSTEMS INTERNATIONAL SARL
(COLLECTIVELY “BLUE COAT”) DISCLAIM ALL WARRANTIES, CONDITIONS OR OTHER
TERMS, EXPRESS OR IMPLIED, STATUTORY OR OTHERWISE, ON SOFTWARE AND
DOCUMENTATION FURNISHED HEREUNDER INCLUDING WITHOUT LIMITATION THE
WARRANTIES OF DESIGN, MERCHANTABILITY OR FITNESS FOR A PARTICULAR
PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL BLUE COAT, ITS SUPPLIERS
OR ITS LICENSORS BE LIABLE FOR ANY DAMAGES, WHETHER ARISING IN TORT,
CONTRACT OR ANY OTHER LEGAL THEORY EVEN IF BLUE COAT SYSTEMS, INC. HAS
BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
ii
Table of Contents
Table of Contents
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
Stated Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
Supported Blue Coat Devices and Operating Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
Hardware Platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
Software Versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
Chapter Reference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1
ProxySG/ProxyAV With Direct Internet Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
ProxySG/ProxyAV in a Closed Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Basic Deployment: One ProxySG to One ProxyAV. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
Redundant Appliance Topologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5
Deployment Guidelines. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-7
Deployment Workflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-8
Configuring and Installing the ProxySG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-8
Configuring and Installing the ProxyAV . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-10
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-1
The ProxyAV isn’t Scanning Web Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-2
Users Can’t Access Any Web Sites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-3
ProxySG Runs Out of Memory During Heavy Traffic Load . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-5
Scans are Taking Too Long . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-5
My ProxyAV isn’t Getting Virus Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-6
Stated Purpose
This document provides conceptual information about malware threats, deployment guidelines and
workflows, configuration steps for getting the ProxyAV and ProxySG to communicate with each another,
and best practices to consider when deploying the integrated Blue Coat malware solution. This solution
involves the deployment of Blue Coat ProxyAV appliances in the network to perform malware content
scanning on Web responses and/or requests sent through ProxySG appliances.
This integration guide supplements existing product-specific guides. For details and instructions on each
product, use the context-sensitive online help or refer to the following guides:
https://support.bluecoat.com/documentation
Audience
The intended audience for this document is current and potential customers seeking to understand the Blue
Coat malware solution. ProxySG and ProxyAV customers deploying an anti-malware solution will benefit
from having configuration information in a single document.
This document assumes you are knowledgeable with basic network concepts and terminology. Basic
familiarity with Blue Coat products is also recommended but not a prerequisite.
Hardware Platforms
ProxySG models: SG200-x (except 200-A), SG210, SG510, SG800-x, SG810, SG8000-x, SG8100
ProxyAV models: AV2000-E, AV400-E, AV210, AV510, AV810
Software Versions
This guide assumes the latest software versions are installed on the ProxySG (SGOS 5.4) and ProxyAV
(AVOS 3.2). Some of the features (such as ICAP monitoring on the ProxySG) are not available in earlier
versions. If you are consulting this document and your software is more current than the ones listed above,
review the release notes for that release to learn about any new features not yet implemented in this
document.
If a concept or feature is not compatible with a specific AVOS or SGOS release, it is so noted in the
document.
Chapter Reference
This document is structured to be read in its entirety before implementing the AV solution. Deployments
not requiring redundancy can skip chapters 7 and 8.
This document contains the following chapters:
Chapter 1: Introduction
Chapter 2: Benefits of the Blue Coat Anti-Malware Solution
Chapter 3: Deployment
Chapter 4: Configuring the ProxySG and ProxyAV Appliances
Chapter 5: Monitoring ICAP Scanning
Chapter 6: Additional Configuration
Chapter 7: Load Balancing Between Multiple ProxyAV Appliances
Chapter 8: Configuring ProxyAV Failover
Chapter 9: Configuration Best Practices
Chapter 10: Troubleshooting
This chapter includes conceptual information about malware and describes benefits of using the integrated
Blue Coat anti-malware solution. It includes the following topics:
❐ About Web Malware—on page 2-2
Types of Malware
Malware is defined as software designed to infiltrate or damage a computer system without the owner's
informed consent. It can be downloaded from Web pages without a user’s knowledge, often piggybacking
on a user’s trust of a known domain.
The following table lists common types of malware.
Malware Description
MMC Mobile malicious code. Software obtained from remote systems, transferred
across a network, and then downloaded and executed on a local system without
the user’s explicit installation. It can be delivered via visits to a Web site, Web
e-mail, or e-mail with attachments. Examples of MMC include: Scripts, Java
applets, ActiveX, flash animations, Shockwave movies, and macros embedded
within Microsoft Office documents.
Ransomware Software that encrypts data in an unreadable format and then demands payment
in exchange for the decryption key (the ransom)
Malware Description
Trojan horse Software that appears to perform a desirable function but in fact performs
undisclosed malicious functions. A computer worm or virus may be a Trojan
horse.
Virus A computer program that attaches itself to an existing program and can copy
itself and infect a computer without a user’s permission or knowledge
Worm A self-replicating computer program that uses a network to send copies of itself
to other nodes, without any user intervention. Unlike a virus, it does not need to
attach itself to an existing program.
Firewall
ProxySG ProxyAV
The ProxyAV appliance is designed to work specifically with the ProxySG proxy architecture. Each
appliance contains industry-leading technology that communicates together to form a cohesive integration.
All ProxySG and ProxyAV appliances are available in different capacities. Blue Coat provides sizing
information to assist you with determining the correct combination of appliances to deploy. With a proxy
appliance architecture, scalability from a few dozen users to multiple thousands of users is attainable.
The Blue Coat anti-malware solution is designed to prevent malicious code penetration with negligible
network performance impact. Blue Coat achieves this with the ProxyAV software that is designed for
performance and security combined with the power of the ProxySG proxy. If an AV scanner must scan all
cached and uncached content, performance suffers. The Blue Coat AV deployment provides a scan-once,
serve-many benefit when scanning:
• Once an object is cached, it doesn’t need to be scanned again until either the object contents change or
the AV database changes. The AV database is a pattern file that allows anti-virus software to identify
viruses. Whenever the database changes, the ProxyAV needs to rescan any requested objects that are in
the cache, because the new database might know about viruses that the old database didn’t.
• For a non-cacheable object, the ProxyAV scans the object and creates a fingerprint — a secure hash of the
file’s contents. The ProxyAV compares the file’s fingerprint against a database of fingerprints that is
constructed as a result of scanning objects. The object will not be scanned again unless either its
fingerprint changes (indicating the content has changed) or the AV database changes.
The ProxyAV’s scanning methods and capabilities provide three main benefits:
• By customizing ProxySG policy, you determine what application protocols are allowed in your
enterprise, then create policy that determines what type of content is sent for malware scanning. For
example, you might decide GIF files represent a lower risk and instruct the ProxySG to not send them
to the ProxyAV.
• Processing performance is optimized through different configuration options. You can set small and
large object thresholds to differentiate between smaller, common Web objects and larger objects, such
as content streams. Furthermore, a cache timeout is not used to resend files. The ProxyAV retains a
fingerprint, and only resets it when there is a definition update. Only a solution that understands Web
scanning can implement this.
• The final piece includes the user experience. Policy configured on the both the ProxySG and ProxyAV
allows you to determine what happens when an exception (error) occurs. You can allow content to
continue to the client or deny the content. The ProxySG allows you to display patience pages with
custom messages to users when content scans exceed a customizable time limit. Therefore, users are
aware of exactly what is occurring on their desktops, thus reducing the number of IT help desk tickets.
• Kaspersky
• Sophos
• McAfee
• Panda
Blue Coat provides licenses from the above vendors, and you select one vendor for your malware scanning.
When your vendor engine license is about to expire, Blue Coat provides the option to renew it or obtain an
engine license from a different vendor.
ICAP
Blue Coat’s ProxySG and ProxyAV appliances communicate using Internet Content Adaptation Protocol
(ICAP). The ProxySG is the ICAP client, and the ProxyAV is the ICAP server. As the ICAP client, the ProxySG
delivers to the ICAP server the Web content that needs to be scanned. As the ICAP server, the ProxyAV
provides content scanning, filtering, and repair service for Internet-based malicious code. To eliminate
threats to the network and to maintain caching performance, the ProxySG sends objects to the ProxyAV for
checking and saves the scanned objects in its object store. With subsequent content requests, the appliance
serves the scanned object rather than rescanning the same object for each request.
You can scan your data using plain ICAP, secure ICAP, or both. Plain ICAP is useful for scanning
non-confidential data (HTTP); secure ICAP sends data that may be confidential (HTTPS) through a secure
data channel. Secure ICAP is available beginning with SGOS 5.3 and AVOS 3.2.
The Blue Coat solution uses an enhanced ICAP+ version that offers improved performance, reliability,
integrated reporting, and detailed error/exception handling and reporting.
Through configuration options and policy, you control and track (log) the various aspects of Web malware
scanning, including the types of files scanned or ignored, exceptions for groups or protocols, data trickling,
the type of user feedback messages, and more. The following diagram illustrates, at a high level, the data
flow in the Blue Coat Web anti-malware solution.
This chapter illustrates several deployment topologies for incorporating one or more ProxySG and
ProxyAV appliances in your network. It also includes high-level guidelines and workflows for physically
installing the appliances into your network. It includes the following topics:
❐ ProxySG/ProxyAV With Direct Internet Access—on page 3-2
Figure 3-1 Blue Coat appliances deployed with direct Internet access for updates.
The admin PC is used to perform configuration and policy changes on any Blue Coat appliance.
Legend:
1: Retrieve the latest AV appliance firmware update file.
2: Retrieve the latest AV vendor pattern files. Use a script to prepare the files (remove absolute links, for
example).
3: Copy the files to an internal server connected to the AV appliance.
4: Configure the AV appliance to retrieve the update files from the server (HTTP/URL).
This basic deployment is the easiest type of topology to configure and because it doesn’t require redundant
appliances to be purchased, is the least expensive to deploy. However, due to its lack of redundancy, the
basic deployment has the following limitations:
• No Web malware scanning if the ProxyAV goes down. Depending on the policy you implement on the
ProxySG, when the ProxyAV fails, users either receive unscanned content or notices that the content
cannot be delivered.
• No load balancing for ICAP scanning if the ProxyAV gets overwhelmed with ICAP requests.
• No failover if the ProxySG goes down.
Enterprises who need ProxySG failover, without redundant ProxyAV appliances, might use the following
type of topology.
Enterprises with hundreds to thousands of users require the processing power of multiple ProxySG and
ProxyAV devices, working together to provide efficient scanning power plus failover capability.
.
For information on configuring failover on the ProxySG, refer to the ProxySG Configuration and Management
Suite (Volume 1: Getting Started and Volume 5: Advanced Networking).
Deployment Guidelines
When planning the installation of your Blue Coat appliances, consider the following deployment
guidelines:
• Blue Coat recommends that all ProxySG appliances reside on the same subnet as the ProxyAV
appliances they are clients to. This includes using multiple ProxySG appliances sharing multiple
ProxyAV appliances. Make sure to keep the ProxyAV physically and logically close to the ProxySG.
Although you can put the ProxyAV in California and the ProxySG in New York, performance will
suffer. It is recommended that the ProxyAV be on the next-hop VLAN.
• The ProxyAV must have access to the Internet for system and pattern file updates. In a closed network,
you’ll need to download these files from a system that has Internet access and then copy these files to
an internal server connected to the AV appliance; the ProxyAV must be configured to retrieve the
update files from this server. See "ProxySG/ProxyAV in a Closed Network" on page 3-3.
• The ProxyAV can use the ProxySG as a proxy for downloading pattern file and firmware updates, but
this is not required.
• The ProxySG can be deployed in explicit or transparent mode. In explicit mode, each client Web
browser is explicitly configured to use the ProxySG as a proxy server. In transparent mode, the client
Web browser does not know the traffic is being processed by a machine other than the origin content
server. Transparent proxy requires that you use a bridge, a Layer-4 switch, or Web Cache
Communication Protocol (WCCP) to redirect traffic to the ProxySG.
Deployment Workflow
Before installing the ProxyAV, you should install the ProxySG in the network and verify it is functioning
properly as a secure Web gateway. Once you have done tests to determine that the ProxySG is performing
as expected, you can proceed with the ProxyAV installation and configuration.
The following procedure provides high-level steps for performing the initial configuration and physical
installation of the ProxySG.
Configure and Install the ProxySG
Step 1 With a serial console connection, run Novice ProxySG users may need to refer to the ProxySG
the initial setup wizard to configure Quick Start Guide for specific steps.
the ProxySG with basic network
settings.
Step 2 Rack mount the ProxySG and See the ProxySG Quick Start Guide for specific steps.
connect the appliance to the
network.
Step 3 Register and license the ProxySG. To register and license your ProxySG:
Your ProxySG ships with a a. Open a Web browser and navigate to:
temporary (60-day) license. You can https://support.bluecoat.com/licensing
register your appliance at any time b. Enter your BlueTouch Online credentials.
during that period.
c. Follow the instructions to register your appliance and
download a license.
Step 6 Set the Explicit HTTP proxy service a. Select Configuration > Services > Proxy Services.
to intercept, and add a rule in the
Web access layer to allow this traffic.
Step 7 Verify that the ProxySG is seeing a. Make sure there are clients running traffic.
network traffic. Note: The browser must be explicitly or transparently
redirected to the ProxySG appliance.
b. Select Statistics > Sessions > Active Sessions.
c. Click Show. The Proxied Sessions table should list the
active sessions of current traffic.
The following procedure provides high-level steps for performing the initial configuration and physical
installation of the ProxyAV. The ProxyAV installation should be done after the ProxySG installation.
Configure and Install the ProxyAV
Step 1 Rack mount the ProxyAV, insert the See the ProxyAV Quick Start Guide for specific steps.
disk drive(s), connect the appliance
to the network, and power on the
ProxyAV.
Step 2 Configure the ProxyAV with basic Use a serial console connection or the buttons on the
network settings. ProxyAV front panel.
Now that the two Blue Coat appliances are installed on the same subnet, you can configure them to work
together. Proceed to the next chapter.
This chapter provides the configuration steps required to integrate the ProxySG and ProxyAV to perform
Web malware scanning. It includes the following topics:
❐ About the Tasks—on page 4-2
1 On the ProxyAV, specify the ICAP service name “Task 1: Prepare the ProxyAV” on page 4-3
and configure secure ICAP (if desired).
2 On the ProxySG, create an ICAP response “Task 2: Create the ICAP Service” on page 4-4
service to communicate with the ProxyAV.
Response services scan Web content requested
by clients (users).
3 On the ProxyAV, configure scan settings. On “Task 3: Create Malware Scanning Policy” on
the ProxySG, create policy for the ICAP service. page 4-8
4 Make sure the policies are working correctly. “Task 4: Test the Anti-Malware Policy” on
page 4-14
Step 2 Name the ICAP service; you will use a. Select ICAP Settings.
this name to help identify the b. In the Antivirus Service Name field, enter a name that
ProxyAV when configuring the identifies the service.
ProxySG.
Step 2 Create a new ICAP service. a. Select Configuration > External Services > ICAP > ICAP
Services.
b. Click New.
Step 3 Edit the new service. a. Highlight the new ICAP service name.
b. Click Edit. The Edit ICAP Service dialog displays.
Step 4 Configure the service a. In the Service URL field, enter the URL of the ProxyAV.
communication options. The URL includes the scheme, the ProxyAV’s hostname
or IP address, and the ICAP service name. For example:
icap://10.10.10.10/avscan
b. Maximum number of connections specifies the maximum
possible connections at any given time that can occur
between the ProxySG and the ProxyAV. Do not change
this value—use the Sense settings button to get the correct
value that your platform supports.
c. In the Connection timeout field, enter the number of
seconds the ProxySG waits for replies from the
ProxyAV. The default timeout is 70 seconds, but you
will likely want it set to a higher value because large
(several hundred MB) archives can easily take more
than 70 seconds. If the ProxyAV gets a large file that
takes more then the configured timeout to scan, the
ProxySG will close the connection and the user will not
get the file. The value you enter for the timeout is related
to the maximum file size configured on the ProxyAV;
larger file sizes require longer to scan so the connection
timeout should be higher. If you allow only 100 MB file
sizes, 70 seconds would be a sufficient timeout value.
But if you allow 2 GB files, a timeout value of 70 would
be too low. The range is 1 to 65535.
d. Select Defer scanning at threshold to set the threshold at
which the ProxySG defers the oldest ICAP connection
that has not yet received a full object. By default, the
deferred scanning threshold is disabled when an ICAP
service is created. When enabled, the defer threshold
scanning defaults to 80 percent. For more information
about scanning deferral, see "Avoiding Network
Outages due to Infinite Streaming Issues" on page 6-5.
e. Select Notify administrator when virus detected to send
an e-mail to the administrator if the ICAP scan detects a
virus. The notification is also sent to the Event Log and
the Event Log e-mail list. Note that the ProxyAV also
has settings for notifying administrators when a virus is
detected; this configuration is explained in "Getting
Notified about Detected Viruses" on page 6-7.
f. Select Use vendor’s “virus found” page to display the
default vendor error exception page to the client instead
of the ProxySG exception page.
Step 5 Configure service ports for plain You can enable one or both types of ICAP connections at the
ICAP (Step 5a) and/or secure ICAP same time.
(Step 5b).
Step 5a Configure service ports for plain a. Select This service supports plain ICAP connections. Use
ICAP. plain ICAP when you are scanning plain data (HTTP).
In this case, if the HTTPS proxy is enabled on the
ProxySG, the data is decrypted first on the ProxySG and
then sent to the ICAP server.
b. In the Plain ICAP port field, enter a port number. The
default port is 1344.
Step 5b Configure service ports for secure a. Select This service supports secure ICAP connections to
ICAP if you are scanning sensitive or use secure ICAP.
confidential data (HTTPS). b. In the Secure ICAP port field, enter a port number. The
default port is 11344.
c. Make sure that you select a valid SSL profile for secure
ICAP in the SSL Device Profile field. This associates an
SSL device profile with the secure ICAP service.
Step 7 Determine whether you need to use • If you are using file scanning policies based on file
the preview feature. extensions on the ProxyAV, enter 0 in the Preview size
(bytes) field, and select enabled. With a 0 bytes preview
size, only response headers are sent to the ProxyAV; more
object data is only sent if requested by the ProxyAV.
or
• If you have enabled the Kaspersky Apparent Data Types
feature on the ProxyAV, enter a value (512 is
recommended) in the Preview size (bytes) field, and select
enabled. The ProxyAV reads the object up to the specified
byte total, and then either continues with the transaction
(that is, receives the remainder of the object for scanning)
or opts out of the transaction.
or
• Unselect enabled if the above two situations don’t apply to
you; do not use the preview option.
d. Click OK.
Step 9 Refresh your browser to see the a. Click your browser’s refresh button.
maximum number of connections b. Edit the response service you created and look at the
that were “sensed.” value that was entered for Maximum number of
connections.
At this point, the ProxyAV and ProxySG are configured to communicate with one another. To verify that the
two appliances are communicating, look at the ICAP service health check on the ProxySG.
Verify Communication Between the ProxySG and ProxyAV
Step 2 Check the status of the ICAP service. a. Select Statistics > Health Checks.
b. For the icap.response service, look at the State. If the
appliances are communicating, the State looks like this:
• Go through Tasks 1 and 2 again and verify that you have followed the configuration steps properly.
• Make sure the ProxySG and ProxyAV are on the same subnet.
• Verify that the ProxySG and ProxyAV have the same ICAP service ports. On the ProxyAV, go to ICAP
Settings. On the ProxySG, go to Configuration > External Services > ICAP > Edit.
• ProxyAV Management Console: Determine maximum scannable file sizes; when exceptions occur,
determine what is sent to the ProxySG; ignore files with specified file extensions.
• ProxySG Management Console: In most enterprise deployments, the default is to scan all Web sites and
objects by default, and create exception rules for specific groups or content types and locations as
required. Use the Visual Policy Manager (VPM) tool to define the scanning policy; advanced users can
use Content Policy Language (CPL).
Before you begin implementing policy, create a plan that answers the following questions:
The ProxyAV Management Console provides several options that allow you to set scanning thresholds and
determine what happens when an exception—or event outside a normal scan process—occurs.
Configure Scanning Settings on the ProxyAV
Step 3 Enable heuristic parameters. When the Heuristic Parameters option is enabled, the AV
appliance learns about traffic patterns on your network and
adjusts accordingly to increase performance. After an initial
learning period, the ProxyAV should be able to accelerate
about 15 to 30 percent of the network’s traffic. The learning
process restarts whenever a new virus pattern file or an
updated scanning engine is downloaded.
Because of the benefits it offers, Blue Coat recommends that
you leave Heuristic Parameters at its default setting
(enabled).
Step 6 Impose limits on the file sizes and • Maximum individual file size: An individual file size
numbers allowed to be scanned. cannot exceed the specified size. This limitation also
applies to each file within an archive. Dependent upon
RAM and disk size of different AV appliance platforms,
the maximum individual file size that can be scanned is
as follows:
– Blue Coat AV210: 768 MB
– Blue Coat AV510: 768 MB
– Blue Coat AV810: 2 GB
Step 7 Define how the ProxyAV behaves Policies for Antivirus exceptions:
when a timeout or other scanning
error occurs. • If Block is selected for an error type, the file is dropped.
This is the default for all options.
The AV appliance is able to identify various file types, including graphics (such as JPG and GIF files), Adobe
PDF files, Microsoft application files, and archive files. Furthermore, the AV appliance recognizes all files
within an archived or compound Microsoft file. If any individual files in these compound files are specified
to be blocked, the entire compound file is blocked. For example, a ZIP file contains Word files and JPG files.
By policy, Word files are allowed, but JPG files are to be blocked. Therefore, the entire ZIP file is blocked.
The Apparent Data Types feature allows you to determine what is blocked, scanned, and served unscanned,
based on file contents. When this feature is enabled, even if an EXE file is renamed with an “innocent” file
extension (such as JPG), the ProxyAV will inspect the file contents and determine that the file is actually an
executable file and will apply appropriate policy for EXE files. This option is available only if you have
selected the Kaspersky or Sophos AV engine.
Configure Scanning Behavior Based on File Contents
Step 1 Enable inspection of file contents. a. On the Scanning Behavior page, click the Policies for file
types link. The Policies For File Types page displays.
The Apparent Data Types option is at the top.
b. Select Enabled.
Step 2 Enable other options. • (Kaspersky only) Select True type of ... container to
enable recognition of individual files in compound files.
If this option is enabled, when an unknown file is
detected within a container, the unknown policy is
applied to the entire container file. If this option
disabled, then unknown files within containers are
scanned.
Step 3 Specify policy for each file type. For each file type, select one of the following:
To accelerate the scanning process, you can specify scanning behavior based on file name extension. You
can block certain file extensions (ones that are notorious for containing viruses) or choose to never scan
certain file types (low-risk ones that are unlikely to contain viruses). Although you can configure file
extension scanning policy on either appliance, it is preferable to configure this type of policy on the
ProxySG. That way, the ProxySG doesn’t waste resources sending files to the ProxyAV that you don’t want
scanned. If you configure the file extension policy on the ProxyAV, the ProxySG will send all file types to
the ProxyAV, and the ProxyAV policy determines which files to scan; this method isn’t as efficient.
The procedure below explains how to configure scanning behavior based on file extensions. For
instructions on configuring file extension policy on the ProxySG, see Chapter 9, “Configuration Best
Practices.”
Note Although file extension scanning policy can increase performance, it can present security risks.
Unlike the Apparent Data Type feature, the File Extensions feature does not inspect the file
contents, so it is possible to disguise an EXE virus with an apparently innocuous file extension (such
as TIF).
Step 1 Indicate which file extensions to a. On the Scanning Behavior page, click the Policies for file
block and not serve to the client. types link. The Policies For File Types page displays.
Locate the File extensions section.
Step 2 Indicate which file extensions c. In the Don’t scan files having extensions field, enter each
needn’t be scanned because they are file extension that you don’t want to be scanned,
unlikely to contain viruses; these file separated by semi-colons. For example:
types will be served to the client .gif; .tif
without any attempt at scanning.
Use the Visual Policy Manger (VPM) to configure policy on the ProxySG.
Configure the ICAP Response Policy
Step 2 Launch the VPM. a. Select Configuration > Policy > Visual Policy Manager.
b. Click Launch. The VPM appears in a new window.
Step 3 Create a Web content layer. a. Select Policy > Web Content Layer.
b. Assign a descriptive name to the layer (for example,
AVresponse).
c. Click OK.
Step 4 Create an action for the rule. a. Right-click the Action column; select Set. The Set Action
Object dialog displays.
b. Click New.
c. Select Set ICAP Response Service. The Add ICAP
Response Service Object dialog displays.
Step 5 Configure the response service a. Select Use ICAP response service.
object. b. In the Available Services list, select the response service
(created in Task 2) and click Add.
c. Select Deny the client request. This option doesn’t serve
Web content when an error occurs during processing
(for example, if the ProxyAV is down and scanning
cannot be completed). The alternative (Continue without
further ICAP response processing) is less secure, but it
doesn’t block network access if the ICAP server goes
down.
d. Click OK; click OK again to add the object.
Step 2 The ProxyAV home page displays If the home page is not already displayed, click Home.
statistics about the number of files
scanned and number of viruses
caught.
Step 3 Confirm that the ProxyAV is Look at the top of the ProxyAV home page:
scanning files.
Step 4 Verify that the ProxyAV is a. Select Advanced > Detailed stats > Requests history.
configured to log ICAP requests. b. Make sure that the Collect last ___ requests field
(You will check the log history later contains a value greater than 0 (zero).
to make sure the test worked.)
c. Click Save Changes.
Step 6 Prepare the ProxySG for test a. Select Configuration > Access Logging > General >
validation by enabling access Default Logging.
logging. b. Enable the Enable Access Logging checkbox.
c. Click Apply.
Step 7 Display the log, so that log entries a. Select Statistics > Access Logging > Log Tail.
can be viewed during testing. b. Click Start Tail.
Step 8 Request an “infected” test file. a. Open a browser that is either explicitly or transparently
redirected to the ProxySG.
Note: The file is not actually infected b. Go to http://www.eicar.org.
but has a virus signature that
c. Click the Anti-Malware Testfile link.
identifies it as infected for testing
purposes. d. Read the information about the test files, and select one
of the files to download (such as eicar.com).
Step 9 Confirm that you were not provided a. A page should display indicating that the ProxyAV has
with the “infected” file. detected a virus in the file, and that the file has been
dropped.
Step 10 Check the ProxySG access log. a. Go to the ProxySG’s Access Log Tail window.
b. Verify that the access log entry for the eicar file contains
an entry for virus detection.
2009-03-12 17:39:51 382 10.9.16.75 - - virus_detected PROXIED "none"
http://www.eicar.org/anti_virus_test_file.htm 200 TCP_DENIED GET
text/html;%20charset=%220%22 http www.eicar.org 80
/download/eicar.com.txt - txt "Mozilla/4.0 (compatible; MSIE 6.0;
Windows NT 5.1; SV1; .NET CLR 2.0.50727)" 10.9.16.76 1000 383 "EICAR
test file"
Step 11 Check the ProxyAV ICAP request a. Go to the ProxyAV browser window.
history. b. Select Advanced > Detailed stats > Requests history.
c. Click Refresh Now.
d. Locate the request for the eicar file.
e. Verify that the Result field contains VIRUS.
Step 12 Request the same “infected” test file a. Request the same “infected” test file.
and verify that ProxySG doesn’t b. Go to the ProxyAV Requests History window.
send a previously-scanned object to
c. Click Refresh Now and verify that there is NOT a second
the ProxyAV since the response for
request for the eicar file. (Since the response for the
the object is now in the ProxySG’s
object was served from the ProxySG cache, it should not
cache.
have been sent to the ProxyAV for scanning.)
This chapter describes different ways to monitor ICAP scanning — on the ProxySG, on the ProxyAV, and
in Blue Coat Reporter. It includes the following topics:
❐ Displaying ICAP Graphs and Statistics on the ProxySG—on page 5-2
Statistic Definition
Secure Requests ICAP scanning transactions that are encrypted and tunneled over SSL
Deferred Requests ICAP scanning transactions that have been deferred until the full object has been
received
Queued Requests ICAP scanning transactions that are waiting until a connection is available
Failed Requests ICAP scanning transactions that failed because of a scanning timeout, connection
failure, server error, or a variety of other situations
Bytes Sent Bytes of ICAP data sent to the ICAP service or service group
Note: Bytes Sent does not include secure ICAP traffic.
Bytes Received Bytes of data received from the ICAP service or service group
Plain Connections Number of connections between the ProxySG and the ProxyAV across which
plain ICAP scanning requests are sent
Note: This statistic is not tracked for service groups.
Secure Connections Number of connections between the ProxySG and the ProxyAV across which
encrypted ICAP scanning requests are sent
Note: This statistic is not tracked for service groups.
ICAP graphs can be used as diagnostic and troubleshooting tools. For instance, if the Active Requests graph
shows excessive queued ICAP requests on a regular basis, this may indicate the need for a higher capacity
ProxyAV.
Display ICAP Graphs on the ProxySG
Step 2 Select Statistics > ICAP. The ICAP statistics screen displays.
Step 3 Choose what you want to graph. Choose one of the following:
Step 4 Select the time period to graph. From the Duration drop-down list, choose from Last Hour,
Last Day, Last Week, Last Month, or Last Year.
Step 5 Select the type of graph. Select one of the following tabs:
Active Requests — Plain, secure, deferred, and queued
active ICAP transactions (sampled once per minute)
Connections — Plain and secure ICAP connections
(sampled once per minute)
Completed Requests — Successful and failed completed
ICAP transactions
Bytes — Bytes sent to the ICAP service and received from
the ICAP service
Each statistic displays as a different color on the stacked bar
graph. By default, all relevant statistics are displayed.
Step 6 Select the name of what you want to In the Name column in the table beneath the graph, select
graph. one of the following:
Additional Information
• While the ICAP statistics screen is displayed, you can view new graphs by selecting different services,
service groups, time periods, or graph types.
• Graphs automatically refresh every minute. This may be noticeable only on graphs with the Last Hour
duration.
• To see the actual statistics associated with a bar on the graph, hover the mouse pointer anywhere on the
bar. A box showing the statistics and total appears at the mouse pointer.
If you are more interested in the data than in the graphs, the ICAP statistics screen displays this information
as well; beneath the graph is a concise table that displays the number of successful and failed requests and
number of bytes sent and received for each service or service group during the selected time period. The
table also calculates totals for each statistic across all services or service groups.
Display ICAP Statistical Data
Step 1 Select Statistics > ICAP. The ICAP statistics screen displays.
Step 2 Choose what you want to graph. Choose one of the following:
Step 3 Select the time period to graph. From the Duration drop-down list, choose from Last Hour,
Last Day, Last Week, Last Month, or Last Year.
Step 4 Review the statistics. For the time period you selected, the ProxySG displays
statistics for individual services as well as totals for all
services.
By default, the Active Sessions screen displays all active sessions. When analyzing ICAP functionality, it’s
helpful to filter the list to display only ICAP-enabled sessions.
List ICAP-Enabled Sessions
Step 2 Display active sessions. Select Statistics > Sessions > Active Sessions > Proxied
Sessions.
Step 3 Select the ICAP filter. Use the Filter drop-down list.
Step 4 (Optional) Filter by type of ICAP Choose REQMOD or RESPMOD. Or choose Any to display
service. both types of services.
Step 5 (Optional) Filter by service name. Select the service name from the Service drop-down list, or
choose Any to display all services.
Step 6 (Optional) Select the ICAP state. Choose one of the following from the Status drop-down list:
transferring, deferred, scanning, completed. Or choose Any to
display all types of connections.
Step 7 (Optional) Limit the number of Select Display the most recent and enter a number in the
connections to view. results field. This helps optimize performance when
there is a large number of connections.
Step 8 (Optional) View only the current Select Show errored sessions only.
errored proxied sessions.
Step 9 Display the ICAP-enabled Click Show. The Proxied Sessions table displays the
sessions. ICAP-enabled sessions.
Of particular interest in the Proxied Sessions table is the ICAP (I) column. This column indicates the status
of the ICAP-enabled session, with unique icons identifying the ICAP status. Table 6-2 describes each of the
ions.
Table 5-2 ICAP Icons
(magnifying glass) Scanning — ICAP requests are in the process of being scanned
(arrow) Transferring — ICAP requests are being transferred to the ICAP server
(clock) Deferred — ICAP scanning requests have been deferred until the full object has
been received
(i) Inactive — The ICAP feature is inactive for the session or connection
Additional Information
Icon Tooltips—When you mouse over an ICAP icon, a tooltip displays details about the session:
• When only one type of service is used for a session, the tooltip indicates whether the other type is
inactive or unsupported, for example:
RESPMOD Service: inactive
Sorting—If you click the I column heading, the sessions are sorted in the following order:
• Transferring
• Deferred
• Scanning
• Completed
• Inactive
• Unsupported
Step 2 The ProxyAV home page displays If the home page is not already displayed, click Home.
statistics about the number of files
scanned and number of viruses
caught. These statistics are
accumulated since the last reboot of
the appliance or the last reset of
counters.
Step 3 View the statistics about number of At the top of the home page:
files scanned and number of viruses
caught.
Step 4 View historical data about ICAP a. Select Advanced > History stats.
objects and connections. b. Select one of the following:
ICAP Objects: Number of ICAP objects received during
the interval
Connections: Maximum number of concurrent
connections made during the interval
ICAP Bytes: Total size in bytes of ICAP objects received
during the interval
For each type of statistic, graphs of three time periods are
shown: last 60 minutes, last 24 hours, and last 30 days.
Here’s an example of the ICAP Objects graph for the last 60
minutes:
Step 5 Display details on the objects the a. Select Advanced > Detailed stats. The following details
ProxyAV is currently scanning. are displayed:
Concurrent connections: Current number of
connections to the ProxyAV.
Total objects being processed: Number of objects the
ProxyAV is currently scanning.
b. Click Refresh Now to see detailed statistics of the objects
currently being scanned.
Step 6 Display the results of past anti-virus a. Select Advanced > Detailed stats.
scans. b. Select Requests History.
c. In the Collect last ___ requests field, enter the number
(0-1000) of requests to display in the list. When the
number is set to zero, request logging is disabled.
d. Click Save Changes.
e. Click Refresh Now to obtain the most current data about
processed requests.
8.3 ICAP virus URL Lists the URL associated with each detected
virus
8.3 ICAP virus user detail Lists the client’s login name or IP address
associated with each detected virus
9.1 Malware Requested Blocked by Lists all URLs that were blocked because of
Site suspected malware presence
9.1 Potential Malware Infected Lists all client IP addresses that might be
Clients infected by malicious content
This data is derived by the URLs requested by
each client.
9.1 ProxyAV Malware Detected: Lists the name of each malware code
Names encountered during employee Web browsing
9.1 ProxyAV Malware Detected: Lists all URLs that were detected as suspected
Site malware sources
This chapter describes techniques for improving the user experience during ICAP scanning (via patience
pages or data trickling), ways to notify administrators about detected viruses, and several additional ICAP
policies that you can implement. It includes the following topics:
❐ Improving the User Experience—on page 6-2
Patience pages are HTML pages displayed to the user if an ICAP content scan exceeds the specified
duration. You can configure the content of these pages to include a custom message and a help link. Patience
pages refresh every five seconds and disappear when object scanning is complete.
Patience pages are not compatible with infinite stream connections—or live content streamed over HTTP—
such as a webcam or video feed. ICAP scanning cannot begin until the object download completes. Because
this never occurs with this type of content, the ProxySG continues downloading until the maximum ICAP
file size limit is breached. At that point, the ProxySG either returns an error or attempts to serve the content
to the client (depending on fail open/closed policy). However, even when configured to fail open and serve
the content, the delay added to downloading this large amount of data is often enough to cause the user to
give up before reaching that point. See Chapter 9: Configuration Best Practices for some alternate solutions.
Patience pages provide a solution to appease users during relatively short delays in object scans. However,
scanning relatively large objects, scanning objects over a smaller bandwidth pipe, or high loads on servers
might disrupt the user experience because connection timeouts occur. To prevent such time-outs, you can
allow data trickling to occur. Depending on the trickling mode you enable, the ProxySG either trickles—or
allows at a very slow rate—bytes to the client at the beginning of the scan or near the very end.
The ProxySG begins serving server content without waiting for the ICAP scan result. However, to maintain
security, the full object is not delivered until the results of the content scan are complete (and the object is
determined to not be infected).
Note This feature is supported for the HTTP proxy only; data trickling for FTP connections is not
supported.
In trickle from start mode, the ProxySG buffers a small amount of the beginning of the response body. As the
ProxyAV continues to scan the response, the ProxySG allows one byte per second to the client.
After the ProxyAV completes its scan:
• If the object is deemed to be clean (no response modification is required), the ProxySG sends the rest of
the object bytes to the client at the best speed allowed by the connection.
• If the object is deemed to be malicious, the ProxySG terminates the connection and the remainder of the
response object bytes are not sent to the client.
Deployment Notes
• This method is the more secure option because the client receives only a small amount of data pending
the outcome of the virus scan.
• One drawback is that users might become impatient, especially if they notice the browser display of
bytes received. They might assume the connection is poor or the server is busy, close the client, and
restart a connection.
In trickle at end mode, the ProxySG sends the response to the client at the best speed allowed by the
connection, except for the last 16 KB of data. As the ProxyAV performs the content scan, the ProxySG allows
one byte per second to the client.
After the ProxyAV completes its scan, the behavior is the same as described in "Trickling Data From the
Start" on page 6-2.
Deployment Notes
• Blue Coat recommends this method for media content, such as Flash objects.
• This method is more user-friendly than trickle at start because users tend to be more patient when they
notice that 99 percent of the object is downloaded. Therefore, they are less likely to perform a connection
restart. However, network administrators might perceive this method as the less secure method, as a
majority of the object is delivered before the results of the ICAP scan.
• Blue Coat defines interactive as the request involving a Web browser. Web browsers support data
trickling and patience pages.
• Non-interactive traffic originates from non-browser applications, such as automatic software download
or update clients. Such clients are not compatible with patience pages; therefore, data trickling or no
feedback are the only supported options.
Based on whether the requirements of your enterprise places a higher value either on security or
availability, the ProxySG allows you to specify the appropriate policy.
After reading the previous section, you should have concluded if you want to provide ICAP feedback to
your users and if so, what type of feedback you want to use for interactive (browser-based) and
non-interactive traffic. The steps for configuring the global feedback settings appear below.
Configure ICAP Feedback for Interactive and Non-Interactive Traffic
Step 2 Specify the amount of time to wait a. Select Configuration > External Services > ICAP > ICAP
before notifying a Web-browser Feedback.
client than an ICAP scan is b. Locate the ICAP Feedback for Interactive Traffic section.
occurring.
Step 3 Select the feedback method for Choose one of the following:
interactive (browser-based) traffic.
• Return patience page (HTTP and FTP patience pages are
available)
• Trickle object data from start (more secure form of
trickling)
• Trickle object data at end (this form of trickling provides
a better user experience)
Step 4 For non-interactive traffic, specify a. Locate the ICAP Feedback for Non-Interactive Traffic
the amount of time to wait before section.
notifying a client than an ICAP scan
is occurring.
These settings are global. You may want to define additional feedback policy that applies to specific user
and conditional subsets. In the Visual Policy Manager, the object is located in the Web Access Layer: Return
ICAP Feedback.
To customize the text on HTTP and FTP patience pages, select Configuration > External Services > ICAP >
ICAP Patience Page.
Infinite streams are connections such as webcams or Flash media—traffic over an HTTP connection—that
conceivably have no end. Characteristics of infinite streams may include no content length, slow data rate
and long response time. Because the object cannot be fully downloaded, the ICAP content scan cannot start;
however, the connection between the ProxySG and the ProxyAV remains, which wastes finite connection
resources.
The deferred scanning feature solves the infinite streaming issue by detecting ICAP requests that are
unnecessarily holding up ICAP connections (without requiring the ProxyAV) and defers those requests
until the full object has been received.
When the number of ICAP resources in use has reached a certain threshold, the ProxySG starts deferring
scanning of the oldest outstanding ICAP requests. Once the defer threshold has been reached, for every new
ICAP request, the ProxySG defers the oldest ICAP connection that has not yet received a full object.
The defer threshold is specified by the administrator as a percentage. For example, if the defer threshold is
set to 70 percent and the maximum connections are set to 100, then up to 70 connections are allowed before
the ProxySG begins to defer connections that have not finished downloading a complete object.
When an ICAP connection is deferred, the connection to the ProxyAV is closed. The application response
continues to be received; when the download is complete, the ICAP request is restarted. The new ICAP
request may still be queued if there are no available ICAP connections. Once a request is deferred, the
ProxySG waits to receive the full object before restarting the request. If there is a queue when a deferred
action has received a complete object, that action is queued behind other deferred actions that have finished.
However, it will be queued before other new requests.
Depending on how you configure the ICAP feedback option (patience page or data trickling) and the size
of the object, deferred scanning may cause a delay in ICAP response because the entire response must be
sent to the ProxyAV at once.
If a patience page is configured, the browser continues to receive a patience page until the object is fully
received and the outstanding ICAP actions have completed.
If the data trickle options are configured, the object continues to trickle during deferred scanning. However,
due to the trickle buffer requirement, there may be a delay, with or without deferred scanning, before the
ProxySG starts sending a response.
You may have already enabled the scanning deferral feature when creating the ICAP service. (See "Task 2:
Create the ICAP Service" on page 4-4.) The steps for enabling scanning deferral and setting its threshold
appear below.
Enable Scanning Deferral for an ICAP Service
Step 2 Edit the ICAP service. a. Select Configuration > External Services > ICAP > ICAP
Services.
b. Select the ICAP service.
c. Click Edit. The Edit ICAP Service window appears.
Step 3 Enable scanning deferral. a. Select Defer scanning at threshold to enable the defer
scanning feature.
Step 4 Save the settings. a. Click OK to close the Edit ICAP Service window.
b. Click Apply.
Step 3 Enter the SMTP server settings. a. In the SMTP server address field, enter the IP address for
the server.
b. If your server requires that POP authentication be used,
select SMTP Authorization (POP-Before-SMTP) Enabled,
and then enter the authentication information.
Select the types of alerts for which you want notification and/or alert log entries.
Select Alert Types
Step 2 Select which alerts you want e-mail a. Select Alerts. The Alerts table appears. By default, all
notification and/or alert log entries alerts are enabled for e-mail and logging.
created.
After configuring the alert settings and selecting the types of alerts you want to be notified about, the
configured recipients will receive e-mail messages to alert them of detected viruses, blocked files, and any
other events you have configured. In addition, an entry will be added to the alert log.
To view the alert log on the ProxyAV, select Log Files and then choose View log file in browser for the
AlertLogFile.log.
Follow these general steps for creating the ICAP request and response modification services. For details on
all of the service options, see "Task 2: Create the ICAP Service" on page 4-4.
Create the ICAP Response and Request Services
Step 2 Create an ICAP response a. Select Configuration > External Services > ICAP > ICAP
modification service. Services.
b. Create a new service named avresponse (for example).
c. Edit the service.
d. For the Service URL, enter the URL of the ProxyAV.
The URL includes the scheme, the ProxyAV’s hostname
or IP address, and the ICAP service name. For example:
icap://10.10.10.10/avscan
e. Select response modification for the ICAP method.
f. Change other settings as required.
g. Click Sense settings.
Step 3 Create an ICAP request a. Create a new service named DLP (for example).
modification service. b. Edit the service.
c. For the Service URL, enter the URL of the ProxyAV.
The URL includes the scheme, the ProxyAV’s hostname
or IP address, and the ICAP service name. For example:
icap://10.10.10.10/avscan
d. Select request modification for the ICAP method.
e. Change other settings as required.
f. Click Sense settings.
Use the Visual Policy Manger (VPM) to configure an ICAP response policy on the ProxySG. This policy is
identical to the one configured in Chapter 4.
Configure the ICAP Response Policy
Step 2 Launch the VPM. a. Select Configuration > Policy > Visual Policy Manager.
b. Click Launch.
Step 3 Create a Web content layer. a. Select Policy > Web Content Layer.
b. Assign a descriptive name to the layer (for example,
AVresponse).
c. Click OK.
Step 4 Create an action for the rule. a. Right-click the Action column; select Set. The Set Action
Object dialog displays.
b. Click New.
c. Select Set ICAP Response Service. The Add ICAP
Response Service Object dialog displays.
Step 5 Configure the response service a. Select Use ICAP response service.
object. b. In the Available services list, select the response service
(created in Task 1) and click Add.
c. Select Deny the client request.
d. Click OK; click OK again to add the object.
Step 1 Create a Web access layer. a. Select Policy > Web Access Layer.
b. Assign a descriptive name to the layer (for example,
DLP).
c. Click OK.
Step 2 Create an HTTP/HTTPS service a. Right-click the Service column; select Set. The Set
object for the request policy. Service Object dialog displays.
b. Click New.
c. Select Protocol Methods. The Add Methods Object
dialog displays.
d. Name the protocol method HTTP and select
HTTP/HTTPS from the Protocol list.
e. In the Common methods section, select the POST and PUT
checkboxes, and click OK.
Step 3 Create an FTP service object. a. In the Set Action Object dialog, click New.
b. Select Protocol Methods. The Add Methods dialog
displays.
c. Name the protocol method FTP and select FTP from the
Protocol list.
d. In the Commands that modify data section, select the STOR
checkbox, and click OK.
Step 4 Create a combined (HTTP and FTP) a. In the Set Action Object dialog, click New.
service object. b. Select the HTTP object and click Add.
c. Select the FTP object and click Add.
d. Click OK.
e. Click OK again to set the Combined Service object as the
Web Access Layer service.
Step 5 Set the action for the Request policy. a. Right-click the Action column and select Set.
b. Click New and select Set ICAP Request Service. The Add
ICAP Request Service Object dialog appears.
c. Select the DLP ICAP Request service and click Add.
d. Click OK.
e. Click OK again.
The first task is to create the ICAP response service; you may already have created one earlier.
Create the ICAP Response Service
Step 2 Create a new ICAP response service. Refer to "Task 2: Create the ICAP Service" on page 4-4 for
instructions on creating this service.
The next task is to create a virus scanning rule in the Web content layer; you may already have created this
rule. However, with user-based ICAP policies, the ICAP response service must fail open (allow requests).
In other policies discussed in this guide, the ICAP response service fails closed (deny requests). Note that
even with a fail open policy, a virus or other malware will always be denied.
Create a Virus Scanning Rule that Fails Open
Step 1 Launch the Visual Policy Manager. a. Select Configuration > Policy > Visual Policy Manager.
b. Click Launch.
Step 2 Create a Web content layer. a. Select Policy > Web Content Layer.
b. Assign a descriptive name to the layer (for example,
AVresponse).
c. Click OK.
Step 3 Create an action for the rule. a. Right-click the Action column; select Set. The Set Action
Object dialog displays.
b. Click New.
c. Select Set ICAP Response Service. The Add ICAP
Response Service Object dialog displays.
Step 4 Configure the response service a. Select Use ICAP response service.
object. b. In the Available Services list, select the response service
(created in the previous task) and click Add.
c. Select Continue without further ICAP response
processing.
To have users prompted for user name and password when they open a Web browser, you need to create a
Web authentication layer.
Create a Rule that Prompts for Web Authentication
Step 2 Create a Web authentication layer. a. Select Policy > Web Authentication Layer.
b. Accept the proposed name or assign a descriptive name
to the layer.
c. Click OK.
Step 3 Configure an authentication action. a. Right-click the Action column; select Set. The Set Action
Object dialog displays.
b. Click New.
c. Select Authenticate. The Add Authenticate Object dialog
displays.
Step 4 Specify the realm name for a. In the Name field, accept the proposed name or type a
authentication. descriptive name for the object.
b. In the Realm drop-down list, select the name of the
previously-configured realm.
The final task is to set up rules that designate which users/groups are allowed access to blocked file types
and which users/groups are denied access.
Create Rules for Allowing/Denying Access to Blocked File Types
Step 2 Create a Web access layer. a. Select Policy > Web Access Layer.
b. Accept the proposed name or assign a descriptive name
to the layer.
c. Click OK.
Step 3 Create a user object for the user you a. Right-click the Source column; select Set. The Set Source
want to allow access to blocked file Object dialog displays.
type. b. Click New.
Note: If you have created user c. Select User. The Add User Object dialog displays.
groups and want to create rules
d. In the User field, type the user name.
based on groups instead of
individual users, you can create a Note: Case is significant for local realms.
group object instead of a user object. e. In the Authentication Realm drop-down list, select the
Follow the steps to the right, except name of the previously-configured realm.
specify group information.
Step 4 Create a service object based on an a. Right-click the Service column; select Set. The Set
ICAP error code. Service Object dialog displays.
b. Click New.
c. Select ICAP Error Code. The Add ICAP Error Code
Object dialog displays.
d. Choose Selected errors.
Step 5 Indicate that this user should be a. Right-click the Action column; select Allow. The Set
allowed access to blocked file types. Service Object dialog displays. The rule should look
similar to the following:
Step 6 In the same Web access layer, create a. Click Add Rule. A new rule row displays.
a rule for another user/group. This b. Right-click the Service column; select Set. The Set
rule will deny access to the Service Object dialog displays.
user/group.
c. From the existing service objects, select
ICAPError_FileTypeBlocked.
d. Click OK to add the object. The rule should look similar
to the following:
Step 7 Create other users/groups to whom Follow the above steps to create appropriate rules in the
you want to allow or deny access. Web access layer.
Once this policy is in place, users may be prompted to enter their credentials upon opening a Web browser;
some realms may authenticate without prompting. Users who have an Allow rule will be able to access
URLs that point to blocked file types or have archive files containing a blocked file type (for instance, a ZIP
file that contains an EXE file). Users who have a Deny rule will see a screen similar to the following when
attempting to access a blocked file type:
This chapter describes how to set up load balancing of scanning requests when your deployment includes
multiple ProxyAV appliances. It includes the following topics:
❐ About Service Groups—on page 7-2
Legend:
Your anti-malware deployment can have multiple ProxySG appliances, each using an identical ICAP
service group of multiple ProxyAV appliances.
To help distribute and balance the load of scanning requests when the ProxySG is forwarding requests to
multiple services within a service group, the ProxySG uses an intelligent load balancing algorithm. When
deciding which service in the service group to send a scanning request, this algorithm takes into
consideration the following factors:
• Number of requests that are in a “waiting” state on each service (a request is in this state when it has
been sent to the service but the response hasn’t been received)
• Number of unused connections available on each service (calculated by subtracting the number of
active transactions from the connection maximum on the server)
Weighting
Weighting determines what proportion of the load one ProxyAV bears relative to the others. If all ProxyAV
servers have either the default weight (1) or the same weight, each share an equal proportion of the load. If
one server has weight 25 and all other servers have weight 50, the 25-weight server processes half as much
as any other server.
Before configuring weights, consider the capacity of each server. Factors that could affect assigned weight
of a ProxyAV include the following:
• The processing capacity of one ProxyAV in relationship to other ProxyAV appliances (for example, the
number and performance of CPUs or the number of network interface cards).
• The maximum number of connections configured for the service. The maximum connections setting
pertains to how many simultaneous scans can be performed on the server, while weighting applies to
throughput in the integration. While these settings are not directly related, consider both when
configuring weighted load balancing.
Note External services (ICAP, Websense off-box) have a reserved connection for health checks. This
means that as the load goes up and the number of connections to the external service reaches the
maximum, with additional requests being queued up and waiting, the maximum simultaneous
connections is actually one less than the limit.
Having appropriate weights assigned to your services is critical when all ProxyAV servers in a service
group become overloaded. As servers reach their capacity, proper weighting is important because requests
are queued according to weight.
One technique for determining weight assignments is to start out by setting equal weights to each service
in a group; then, after several thousand requests, make note of how many requests were handled by each
service. For example, suppose there are two services in a group: Service A handled 1212 requests, Service B
handled 2323. These numbers imply that the second service is twice as powerful as the first. So, the weights
would be 1 for Service A and 2 for Service B.
Setting the weight value to 0 (zero) disables weighted load balancing for the ICAP service. Therefore, if one
ProxyAV of a two-server group has a weight value of 1 and the second a weight value of 0, should the first
ProxyAV go down, a communication error results because the second ProxyAV cannot process the request.
Load Balancing
When load balancing between services, how does the ProxySG decide which ICAP service to send a
scanning request to? For each service, it calculates an index by dividing the number of waiting transactions
by the server weight (think of this as wait/weight). The ICAP service with the lowest index value will
handle the new ICAP action, assuming that the service has an available connection to use. If it doesn’t, it
will send the request to the service with the next lowest index value that has a free connection.
Load will be distributed among services proportionally according to their configured weights until the
maximum connection limit is reached on all services.
Example 1
• Service A can handle up to 50 connections, is assigned a weight of 1, has 17 active transactions, with 5
transactions in the waiting state. The index is calculated by dividing the wait by the weight: 5/1 = 5.
• Service B can handle up to 100 connections, is assigned a weight of 2, has 17 active connections, with 15
waiting transactions. The index is 15/2 = 7.5.
Which service will the ProxySG assign the next ICAP action? Service A because it has a lower index.
Example 2
• Service C can handle up to 5 connections, is assigned a weight of 1, has 5 active transactions, with 1
transaction in the waiting state. The index is 1/1=1.
• Service D can handle up to 10 connections, is assigned a weight of 1, has 7 active transactions, with 5
waiting transactions. The index is 5/1=5.
To which service will the ProxySG assign the next ICAP action? Although Service C has a lower index than
Service D, it doesn’t have any available connections; therefore, the ProxySG will assign the next ICAP action
to Service D which has several free connections.
Step 2 Add a new service group. a. Select Configuration > External Services >
Service-Groups.
b. Click New; the Add List Item dialog appears.
c. In the Add Service Group field, enter an alphanumeric
name. This example creates a group called avcluster.
d. Click OK.
Step 3 Edit the service group. a. Highlight the new service group name and click Edit;
the Edit Service Group dialog appears.
b. Click New; the Add Service Group Entry dialog appears.
Step 4 Assign weights to services. a. Select a service and click Edit; the Edit Service Group
Entry weight dialog appears.
Step 2 Launch the VPM. a. Select Configuration > Policy > Visual Policy Manager.
b. Click Launch.
Step 3 Create a Web content layer. a. Select Policy > Web Content Layer.
b. Assign a descriptive name to the layer (for example,
avcluster).
c. Click OK.
Step 4 Create an action for the rule. a. Right-click the Action column; select Set. The Set Action
Object dialog displays.
b. Click New.
c. Select Set ICAP Response Service. The Add ICAP
Response Service Object dialog displays.
Step 5 Configure the response service a. Select Use ICAP response service.
group object. b. In the Available services list, select the response service
group (the one created in "Creating an ICAP Service
Group" on page 7-5) and click Add.
Result: Using the ICAP load balancing policy, the ProxySG sends ICAP response modification
requests to ProxyAV appliances in the service group. The load carried by each ProxyAV in the
group is determined by the weight values.
This chapter describes how to use two ProxyAV appliances to provide redundancy in case the primary
ProxyAV fails. It includes the following topics:
❐ About ProxyAV Failover—on page 8-2
Step 2 Launch the VPM. a. Select Configuration > Policy > Visual Policy Manager.
b. Click Launch.
Step 3 Create a Web content layer. a. Select Policy > Web Content Layer.
b. Assign a descriptive name to the layer (for example,
avfailover).
c. Click OK.
Step 4 Create an action for the rule. a. Right-click the Action column; select Set. The Set Action
Object dialog displays.
b. Click New.
c. Select Set ICAP Response Service. The Add ICAP
Response Service Object dialog displays.
Step 5 Configure the response service a. Select Use ICAP response service.
group object. b. In the Available services list, select the primary ProxyAV
service and click Add.
c. In the Available services list, select the secondary
(standby) ProxyAV service and click Add.
Result: Using the ICAP failover policy, the ProxySG sends all ICAP response modification requests
to the primary ProxyAV. If this appliance fails, the ProxySG sends all requests to the standby
ProxyAV until the primary appliance is healthy again.
This chapter describes strategies for improving scanning performance. It includes the following topics:
❐ Conserving Scanning Resources—on page 9-2
Step 2 Confirm that ICTM is enabled. a. Select Advanced > Intelligent Connection Traffic
Monitoring.
b. Make sure that the Intelligent Connection Traffic
Monitoring (ICTM) checkbox is selected.
Step 3 Define what you consider to be a If desired, modify the default setting (60) in the ICAP
slow download. connections are considered “slow” when the download
Blue Coat recommends the default exceeds ___ seconds field.
of 60 seconds. The larger the value,
the more resources are wasted on
suspected infinite stream URLs.
Conversely, lower values might tag
the downloads of large objects as
slow, thus targeting them for
termination before the download is
complete.
Step 4 Specify warning threshold a. In the Log a warning when more than ___ connections are
parameters. “slow” field, enter the number of concurrent slow
connections at which the ProxyAV will send a warning
message. The default setting is 70% of the
recommended maximum ICAP connections for the
ProxyAV platform.
Step 5 Specify critical threshold a. In the Drop older "slow" connections when more than ___
parameters. connections are “slow” field, enter the number of
concurrent slow connections at which the ProxyAV will
start dropping connections to maintain a level below the
critical threshold. Oldest connections are dropped first.
This value must be larger than the warning threshold
(Step 4). The default setting is 90% of the recommended
maximum ICAP connections for the ProxyAV platform.
In addition to enabling ICTM, you should also implement a policy to control scanning of infinite streams.
The example policies below offer two different approaches and are not intended to co-exist. Select only one.
To enhance user satisfaction and achieve maximum performance from the ProxyAV, some customers
choose not to scan data streams that are known to cause issues. One benefit of this policy is reduced load
on the ProxyAV. The risk is that the exemption could potentially allow malicious content to slip viruses
through unscanned.
This policy is based on request/response patterns that indicate an overly large or slow download. This
policy assumes that the ICAP response rule is already defined; the actions in the policy will reset it back to
(no) upon an attempt to scan a streaming object or an object that shouldn’t be scanned. The policy looks for
very long content or objects in which no content length is provided; these are signs that this object may tie
up ProxyAV resources. The policy also looks for common infinite streaming media types as well as user
agents that are known to cause scanning problems. In addition, the policy defines URL domains that
shouldn’t be scanned (such as finance.google.com and youtube.com) because they are known to contain
infinite streams.
Blue Coat has written the Content Policy Language (CPL) for this policy and you can download the file,
customize it for your own needs, and install it on your ProxySG.
Install a No Scan Policy for Slow Downloads
Step 3 Install the policy file. a. Select Configuration > Policy > Policy Files.
b. From the Install Local File from drop-down list, select
Text Editor.
c. Click Install. A browser window displays the Edit and
Install the Local Policy File page.
d. Open your CPL file and copy the text.
e. Return to the Edit and Install the Local Policy File page,
and paste the contents of the file at the end of the local
policy file on your ProxySG.
f. Click Install. A dialog displays, informing you whether
the installation was successful. If necessary, correct any
errors in the file and reinstall it.
request.header.User-Agent="itunes"
request.header.User-Agent="forest"
request.header.User-Agent="Scottrader"
request.header.User-Agent="SVN"
end condition MissBehaving_Old_UserAgents
define condition HTTPv0.9_UserAgents
http.response.version=0.9 condition=MissBehaving_Old_UserAgents
end condition HTTPv0.9_UserAgents
define condition NOICAP
condition=VIDEO_AUDIO_with_NO_or_LARGE_CONTENT_LENGTH
condition=HTTPv0.9_UserAgents
condition=UserAgents_with_NO_or_LARGE_CONTENT_LENGTH
; Yahoos stock ticker problem -15sep06
url.domain=//streamerapi.finance.yahoo.com
url.domain=//stream.aol.com
url.domain=//finance.google.com
; Other streaming media exceptions
url.domain=//youtube.com
url.domain=//pandora.com
end condition NOICAP
; -------------End ICAP Best Practices-------------------------
Some administrators choose to wait for one of the symptomatic errors (Maximum file size exceeded or Scan
timeout) to occur and then serve the data stream unscanned. This approach ensures that all data is still sent
to the ProxyAV—thus, the maximum amount of scanning can occur.
The downside to this approach is that all requests for infinite data streams must reach the maximum file
size or scan timeout configured on the ProxyAV. If a sufficient number of concurrent requests for such data
streams occur, the request queue will slow or delay other traffic.
This policy example serves the data stream if the error is Maximum file size exceeded or Scan timeout; other
errors are denied. Blue Coat has written the CPL for this policy and you can download the file, customize
it for your own needs, and install it on your ProxySG.
Install a No Scan Policy for Slow Downloads
Step 3 Install the policy file. a. Select Configuration > Policy > Policy Files.
b. From the Install Local File from drop-down list, select
Text Editor.
c. Click Install. A browser window displays the Edit and
Install the Local Policy File page.
d. Open your CPL file and copy the text.
e. Return to the Edit and Install the Local Policy File page,
and paste the contents of the file at the end of the local
policy file on your ProxySG.
f. Click Install. A dialog displays, informing you whether
the installation was successful. If necessary, correct any
errors in the file and re-install it.
; edit the <resp_service> below to be the name of your ICAP respmod service name
<cache>
response.icap_service(<resp_service>, fail_open)
<proxy>
condition=!maxfilesizeexceeded_or_scantimeout_errors exception(icap_error)
The following policy excludes the Real Media file type from being scanned because it is considered to be a
very low risk to contain harmful content.
define condition FileExtension_lowrisk
url.extension = rm
end condition FileExtension_lowrisk
<Cache>
condition= ! FileExtension_lowrisk response.icap_service(avresponse,fail_closed)
In the Destination column, a File Extensions object is created, which contains the Real Media file type; the
object is then negated (notice the symbol):
Table 9-1 Web Content Layer with a rule to negate the low-risk file extension.
The following policy specifies that HTML and ZIP file types are to be scanned:
define condition FileExtension_highrisk
url.extension=html
url.extension=zip
end condition FileExtension_highrisk
<Cache>
condition=FileExtension_highrisk response.icap_service(avresponse,fail_closed)
Another rule is added. In the Destination column, a File Extensions object is created, which contains the
HTML and ZIP file types:
Table 9-2 Subsequent rule with the high-risk file types added.
This chapter provides solutions to problems customers may have when integrating the ProxySG and
ProxyAV anti-malware solution. It includes the following topics:
❐ The ProxyAV isn’t Scanning Web Traffic—on page 10-2
❐ ProxySG Runs Out of Memory During Heavy Traffic Load—on page 10-5
• Did you create an ICAP service on the ProxySG? (See "Task 2: Create the ICAP Service" on page 4-4.)
• Does the ICAP service have the correct URL of the ProxyAV? Does the URL include the same antivirus
service name specified on the ProxyAV? If you changed the antivirus service name from its default
(avscan), you must make sure to include this same name as part of the Service URL for the ICAP service
on the ProxySG. The Service URL should look something like this:
• Did you create a policy for the ICAP service? (See "Task 3: Create Malware Scanning Policy" on page
4-8.)
Solution 1: If the ProxyAV is down and your ICAP policy is set to Deny the client request if an error occurs
during ICAP processing, users will not be able to browse the Internet — all requests will be denied. Thus,
if you have created your ICAP policy on the ProxySG before setting up the ProxyAV, users will not have
Web access. Therefore, it’s important to have the ProxyAV up and running before you install the ICAP policy.
To avoid the inevitable support calls that result from lack of Web access when the ProxyAV is down, you
may want to consider changing the ICAP policy to Continue without further ICAP response processing. With
this setting, users will be able to browse the Internet when the ProxyAV is down. However, this opens up
the network to potential viruses being downloaded during the ProxyAV downtime. (Although desktop
virus scanners might prevent this.)
Solution 2: This problem can also be caused by inconsistent secure ICAP settings for the ICAP service,
ProxyAV, and ICAP policy. If you want to use secure ICAP for HTTPS, you need to enable it in all three
places. The following series of screenshots shows the proper settings that should be in place to allow users
to browse secure Web sites (scanned with secure ICAP) and non-secure Web sites (scanned with plain
ICAP).
Figure 10-2 Secure ICAP enabled on the ICAP service (configured on the ProxySG)
Figure 10-3 Secure ICAP enabled in the policy for the ICAP response service (configured in the VPM)
Solution 3: This problem can be caused by incorrect SSL configuration for secure ICAP. Make sure you have
followed the steps below:
1. Copy the ProxyAV appliance certificate (Advanced > SSL Certificates).
2. Import the ProxyAV appliance certificate as a CA certificate on the ProxySG (Configuration > SSL > CA
Certificates > Import).
3. Create a new CA certificate list specifically for secure ICAP and add the ProxyAV CA certificate created
in step 2 (Configuration > SSL > CA Certificates > CA Certificate Lists > New).
4. Create a new SSL device profile for secure ICAP. Select the default keyring and the CCL you created in
step 3 (Configuration > SSL > Device Profiles > New).
5. Configure the ICAP service to use the SSL device profile created in step 4 (Configuration > External
Services > ICAP > Edit).
Solution 4: The anti-virus license could be invalid or expired. To check the status of the anti-virus license
on the ProxyAV, click Antivirus.
If you have two ProxySGs sending ICAP requests to a single ProxyAV, you also need to be careful about not
setting too high of a value for Maximum number of connections. If the Sense settings button determines that
the maximum number of connections is 10, you should divide this value by two, and enter this setting on
each of the ProxySGs.
Solution 2: Each anti-virus vendor provides pattern file updates that necessarily contain portions (or
descriptions) of viruses. Generally, these virus segments are encoded and are too small to be mistaken as a
true virus by other AV vendors. But occasional false positives occur. These can be prevented by exempting
virus pattern update locations from scanning, as the following example policy illustrates (place this policy
after all other ICAP policies on the ProxySG):
<cache>
url.host=download.bluecoat.com response.icap_service(no)
url.host=av-download.bluecoat.com response.icap_service(no)